crowdstrike/ioc Dashboards

Domain overview
WidgetDescriptionType
IOC geolocation Location of client IP addresses present in IOC. Note - location of client IP does not always correlate with actual physical location of user or system

Hide Query

Show Query

World Map
Threat types Pie chart showing breakdown of threat types (linked to client IP)

Hide Query

Show Query

Pie Chart
Threat relationships Links client IP IOC labels to the different values of each label

Hide Query

Show Query

Sankey
Actors Pie chart showing breakdown of threat actors (linked to client IP)

Hide Query

Show Query

Pie Chart
Kill chains Pie chart showing breakdown of kill chain values (linked to client IP)

Hide Query

Show Query

Pie Chart
All threat details Detailed information of all threats found in client IPs

Hide Query

Show Query

Table
Malware Pie chart showing breakdown of malware types (linked to client IP)

Hide Query

Show Query

Pie Chart
note-1624965575450 # All Details The table below shows details of all the threats found, irrespective of the threshold filter applied. Click on the various aspects of these results to drill down into the raw events Note
IP overview
WidgetDescriptionType
IOC geolocation Location of client IP addresses present in IOC. Note - location of client IP does not always correlate with actual physical location of user or system

Hide Query

Show Query

World Map
Threat types Pie chart showing breakdown of threat types (linked to client IP)

Hide Query

Show Query

Pie Chart
Threat relationships Links client IP IOC labels to the different values of each label

Hide Query

Show Query

Sankey
Actors Pie chart showing breakdown of threat actors (linked to client IP)

Hide Query

Show Query

Pie Chart
Kill chains Pie chart showing breakdown of kill chain values (linked to client IP)

Hide Query

Show Query

Pie Chart
All threat details Detailed information of all threats found in client IPs

Hide Query

Show Query

Table
Malware Pie chart showing breakdown of malware types (linked to client IP)

Hide Query

Show Query

Pie Chart
note-1624965575450 # All Details The table below shows details of all the threats found, irrespective of the threshold filter applied. Click on the various aspects of these results to drill down into the raw events Note
Overview
WidgetDescriptionType
Threat attributes Displays a flow chart of threat attributes based on URL, IP and domain data.

Hide Query

Show Query

Sankey
Threat severity over time Displays threat severity over time using URL, IP address, and domain.

Hide Query

Show Query

Time Chart
Threats by confidence Displays a list of threats by confidence level based on URLs, IP addresses, and domains.

Hide Query

Show Query

Pie Chart
Guide Please use these dashboards as inspiration on building your own security insights. To get started, edit the queries in the widget to insert the right field names you want to look up IOC matches on. Note
URL overview
WidgetDescriptionType
IOC geolocation Location of client IP addresses present in IOC. Note - location of client IP does not always correlate with actual physical location of user or system

Hide Query

Show Query

World Map
Threat types Pie chart showing breakdown of threat types (linked to client IP)

Hide Query

Show Query

Pie Chart
Threat relationships Links client IP IOC labels to the different values of each label

Hide Query

Show Query

Sankey
Actors Pie chart showing breakdown of threat actors (linked to client IP)

Hide Query

Show Query

Pie Chart
Kill chains Pie chart showing breakdown of kill chain values (linked to client IP)

Hide Query

Show Query

Pie Chart
All threat details Detailed information of all threats found in client IPs

Hide Query

Show Query

Table
Malware Pie chart showing breakdown of malware types (linked to client IP)

Hide Query

Show Query

Pie Chart
note-1624965575450 # All Details The table below shows details of all the threats found, irrespective of the threshold filter applied. Click on the various aspects of these results to drill down into the raw events Note